123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127 |
- /**
- * @file backtrace.c
- *
- * @remark Copyright 2002 OProfile authors
- * @remark Read the file COPYING
- *
- * @author John Levon
- * @author David Smith
- */
- #include <linux/oprofile.h>
- #include <linux/sched.h>
- #include <linux/mm.h>
- #include <asm/ptrace.h>
- #include <asm/uaccess.h>
- struct frame_head {
- struct frame_head * ebp;
- unsigned long ret;
- } __attribute__((packed));
- static struct frame_head *
- dump_kernel_backtrace(struct frame_head * head)
- {
- oprofile_add_trace(head->ret);
- /* frame pointers should strictly progress back up the stack
- * (towards higher addresses) */
- if (head >= head->ebp)
- return NULL;
- return head->ebp;
- }
- static struct frame_head *
- dump_user_backtrace(struct frame_head * head)
- {
- struct frame_head bufhead[2];
- /* Also check accessibility of one struct frame_head beyond */
- if (!access_ok(VERIFY_READ, head, sizeof(bufhead)))
- return NULL;
- if (__copy_from_user_inatomic(bufhead, head, sizeof(bufhead)))
- return NULL;
- oprofile_add_trace(bufhead[0].ret);
- /* frame pointers should strictly progress back up the stack
- * (towards higher addresses) */
- if (head >= bufhead[0].ebp)
- return NULL;
- return bufhead[0].ebp;
- }
- /*
- * | | /\ Higher addresses
- * | |
- * --------------- stack base (address of current_thread_info)
- * | thread info |
- * . .
- * | stack |
- * --------------- saved regs->ebp value if valid (frame_head address)
- * . .
- * --------------- saved regs->rsp value if x86_64
- * | |
- * --------------- struct pt_regs * stored on stack if 32-bit
- * | |
- * . .
- * | |
- * --------------- %esp
- * | |
- * | | \/ Lower addresses
- *
- * Thus, regs (or regs->rsp for x86_64) <-> stack base restricts the
- * valid(ish) ebp values. Note: (1) for x86_64, NMI and several other
- * exceptions use special stacks, maintained by the interrupt stack table
- * (IST). These stacks are set up in trap_init() in
- * arch/x86_64/kernel/traps.c. Thus, for x86_64, regs now does not point
- * to the kernel stack; instead, it points to some location on the NMI
- * stack. On the other hand, regs->rsp is the stack pointer saved when the
- * NMI occurred. (2) For 32-bit, regs->esp is not valid because the
- * processor does not save %esp on the kernel stack when interrupts occur
- * in the kernel mode.
- */
- #ifdef CONFIG_FRAME_POINTER
- static int valid_kernel_stack(struct frame_head * head, struct pt_regs * regs)
- {
- unsigned long headaddr = (unsigned long)head;
- #ifdef CONFIG_X86_64
- unsigned long stack = (unsigned long)regs->rsp;
- #else
- unsigned long stack = (unsigned long)regs;
- #endif
- unsigned long stack_base = (stack & ~(THREAD_SIZE - 1)) + THREAD_SIZE;
- return headaddr > stack && headaddr < stack_base;
- }
- #else
- /* without fp, it's just junk */
- static int valid_kernel_stack(struct frame_head * head, struct pt_regs * regs)
- {
- return 0;
- }
- #endif
- void
- x86_backtrace(struct pt_regs * const regs, unsigned int depth)
- {
- struct frame_head *head;
- #ifdef CONFIG_X86_64
- head = (struct frame_head *)regs->rbp;
- #else
- head = (struct frame_head *)regs->ebp;
- #endif
- if (!user_mode_vm(regs)) {
- while (depth-- && valid_kernel_stack(head, regs))
- head = dump_kernel_backtrace(head);
- return;
- }
- while (depth-- && head)
- head = dump_user_backtrace(head);
- }
|